Skip to main content

RST Cloud - Threat Feed API

This Integration is part of the RST Threat Feed Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.0.0 and later.

This is the RST Threat Feed integration for interacting with API This integration was integrated and tested with RST Cloud - Threat Feed API v1

Please contact the RST Cloud team via email support@rstcloud.net to obtain a key and ask any questions you have. Also, the following contact details can be used:

Each indicator is ranked from 0 to 100. Indicators are being collected from multiple sources and are cross-verified using multiple criteria. Please check indicator tags and malware family fields. An indicator may describe a known malware or a scanning host. Therefore, different actions may be required based on the context.

Configure RST Cloud - Threat Feed API in Cortex#

ParameterDescriptionRequired
Server URL (e.g. https://api.rstcloud.net/v1)True
API KeyTrue
Score threshold for IP reputation commandSet this to determine the RST Threat Feed score that will determine if an IP is malicious (0-100)True
Score threshold for domain reputation commandSet this to determine the RST Threat Feed score that will determine if a domain is malicious (0-100)True
Score threshold for url reputation commandSet this to determine the RST Threat Feed score that will determine if a url is malicious (0-100)True
Score threshold for file reputation commandSet this to determine the RST Threat Feed score that will determine if a file is malicious (0-100)True
IP Indicator Expiration (days)Mark IP indicators older than indicator_expiration_ip value in days as Suspicious ignoring the last available scoreTrue
Domain Indicator Expiration (days)Mark domain indicators older than indicator_expiration_domain value in days as Suspicious ignoring the last available scoreTrue
URL Indicator Expiration (days)Mark URL indicators older than indicator_expiration_url value in days as Suspicious ignoring the last available scoreTrue
Hash Indicator Expiration (days)Mark Hash indicators older than indicator_expiration_url value in days as Suspicious ignoring the last available scoreTrue
Use system proxy settingsFalse
Trust any certificate (not secure)False

Commands#

You can execute these commands from the CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.

ip#


Returns IP information and reputation.

Base Command#

ip

Input#

Argument NameDescriptionRequired
ipList of IPs.Required
thresholdIf the IP has reputation above the threshold then the IP defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 45.Optional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
IP.AddressStringIP address.
IP.Geo.CountryStringCountry of origin.
IP.TagsStringThe associated tags.
IP.Malicious.VendorStringThe vendor reporting the IP address as malicious.
IP.Malicious.DescriptionStringA description explaining why the IP address was reported as malicious.
IP.Malicious.ScoreStringThe score calculated for the indicator by the vendor.
RST.IP.AddressStringThe actual IP address.
RST.IP.Geo.CountryStringThe country name.
RST.IP.Geo.RegionStringThe geo region name.
RST.IP.Geo.CityStringThe city name.
RST.IP.ASNStringThe autonomous system name for the IP address.
RST.IP.OrganizationStringThe organisation name for the autonomous system name for the IP address.
RST.IP.ISPStringThe Internet Service Provider name for the autonomous system name for the IP address.
RST.IP.CloudHostingStringThe Cloud Provider name for the IP address.
RST.IP.NumberOfDomainInASNStringThe number of domain names for the IP address.
RST.IP.FirstSeenDateFirst Seen.
RST.IP.LastSeenDateLast Seen.
RST.IP.TagsStringThe associated tags.
RST.IP.ThreatStringThe associated Malware Family or threat name.
RST.IP.ScoreNumberThe total score.
RST.IP.UUIDStringThe unique ID for the indicator.
RST.IP.RSTReferenceStringThe link to the raw JSON indicator.
RST.IP.RelatedStringThe associated domains.
RST.IP.FalsePositiveStringtrue if it is likely a False Positive.
RST.IP.FalsePositiveDescStringDescription why we think it may be a False Positive.
RST.IP.CVEStringRelated CVE (vulnerabilities)
RST.IP.IndustryStringRelated Industry.
RST.IP.ReportStringCollected from.

Command Example#

!ip ip=1.2.3.4 threshold=50

Context Example#

{
"DBotScore": {
"Indicator": "1.2.3.4",
"Score": 2,
"Type": "ip",
"Vendor": "RST Cloud"
},
"IP": {
"ASN": "4788",
"Address": "1.2.3.4",
"Geo": {
"Country": "Malaysia"
},
"Tags": [
"c2",
"generic"
]
},
"RST": {
"IP": {
"ASN": "4788",
"Address": "1.2.3.4",
"CloudHosting": "",
"FalsePositive": "false",
"FalsePositiveDesc": "",
"FirstSeen": "2019-12-05T00:00:00.000Z",
"Geo": {
"city": "Batang Kali",
"country": "Malaysia",
"region": "Selangor"
},
"ISP": "TMNETASAP",
"LastSeen": "2021-01-26T00:00:00.000Z",
"NumberOfDomainInASN": "9615",
"Organization": "TM Net Internet Service Provider",
"RSTReference": "https://rstcloud.net/uuid?id=8f10a17d-9931-3329-b97f-db3953c093e2",
"Related": [],
"Score": "3",
"Tags": [
"c2",
"generic"
],
"Threat": [
"emotet"
],
"Type": "IP",
"UUID": "8f10a17d-9931-3329-b97f-db3953c093e2"
}
}
}

Human Readable Output#

RST Threat Feed IP Reputation for: 1.2.3.4#

DescriptionLast SeenRelevanceScoreTagsThreat
Ioc with tags: c2, generic. related threats: emotet
2021-01-26Suspicious3c2, genericemotet

domain#


Returns Domain information and reputation.

Base Command#

domain

Input#

Argument NameDescriptionRequired
domainList of Domains.Required
thresholdIf the domain has reputation above the threshold then the domain defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 45.Optional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
Domain.NameStringThe domain name.
Domain.TagsStringThe associated tags
Domain.Malicious.VendorStringThe vendor reporting the domain as malicious.
Domain.Malicious.DescriptionStringA description explaining why the domain was reported as malicious.
Domain.Malicious.ScoreStringThe score calculated for the indicator by the vendor.
RST.Domain.NameStringThe domain name.
RST.Domain.WhoisAgeNumberDays since creation.
RST.Domain.WhoisDomainCreationDateDateCreation date. Format is ISO8601.
RST.Domain.WhoisDomainUpdateDateDateUpdate date. Format is ISO8601.
RST.Domain.WhoisDomainExpireDateDateExpiration date. Format is ISO8601.
RST.Domain.WhoisRegistrarStringDomain Registrar.
RST.Domain.WhoisRegistrantStringDomain Registrant.
RST.Domain.FirstSeenDateFirst Seen.
RST.Domain.LastSeenDateLast Seen.
RST.Domain.TagsStringThe associated tags.
RST.Domain.ThreatStringThe associated Malware Family or threat name.
RST.Domain.ScoreNumberThe total score.
RST.Domain.UUIDStringThe unique ID for the indicator.
RST.Domain.RSTReferenceStringThe link to the raw JSON indicator.
RST.Domain.RelatedStringThe associated IP addresses.
RST.Domain.FalsePositiveStringtrue if it is likely a False Positive.
RST.Domain.FalsePositiveDescStringDescription why we think it may be a False Positive.
RST.Domain.CVEStringRelated CVE (vulnerabilities)
RST.Domain.IndustryStringRelated Industry.
RST.Domain.ReportStringCollected from.

Command Example#

!domain domain="domaintovalidate.local" threshold=40

Context Example#

{
"DBotScore": {
"Indicator": "domaintovalidate.local",
"Score": 2,
"Type": "domain",
"Vendor": "RST Cloud"
},
"Domain": {
"Name": "domaintovalidate.local",
"Tags": [
"malware"
]
},
"RST": {
"Domain": {
"FalsePositive": "true",
"FalsePositiveDesc": "Domain not resolved. Whois records not found",
"FirstSeen": "2020-06-26T00:00:00.000Z",
"LastSeen": "2021-01-25T00:00:00.000Z",
"Name": "domaintovalidate.local",
"RSTReference": "https://rstcloud.net/uuid?id=552fdbe7-7265-3a9d-b364-83426d1c2dbc",
"Related": {
"a": [],
"alias": [],
"cname": []
},
"Score": "10",
"Tags": [
"malware"
],
"Threat": [],
"Type": "Domain",
"UUID": "552fdbe7-7265-3a9d-b364-83426d1c2dbc",
"WhoisAge": "",
"WhoisDomainCreationDate": "",
"WhoisDomainExpireDate": "",
"WhoisDomainUpdateDate": "",
"WhoisRegistrant": "",
"WhoisRegistrar": ""
}
}
}

Human Readable Output#

RST Threat Feed Domain Reputation for: domaintovalidate.local#

DescriptionLast SeenRelevance:ScoreTags
Ioc with tags: malware
2021-01-25Suspicious10malware

url#


Returns URL information and reputation.

Base Command#

url

Input#

Argument NameDescriptionRequired
urlList of URLs.Required
thresholdIf the URL has reputation above the threshold then the URL defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 30.Optional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
URL.DataStringThe URL.
URL.TagsStringThe associated tags.
URL.Malicious.VendorStringThe vendor reporting the URL as malicious.
URL.Malicious.DescriptionStringA description explaining why the URL was reported as malicious.
URL.Malicious.ScoreStringThe score calculated for the URL indicator by the vendor.
RST.URL.DataStringThe URL.
RST.URL.StatusStringLast HTTP status code.
RST.URL.FirstSeenDateFirst Seen.
RST.URL.LastSeenDateLast Seen.
RST.URL.TagsStringThe associated tags.
RST.URL.ThreatStringThe associated Malware Family or threat name.
RST.URL.ScoreNumberThe total score.
RST.URL.UUIDStringThe unique ID for the indicator
RST.URL.DescriptionStringThe associated Description provided by the vendor.
RST.URL.FalsePositiveStringtrue if it is likely a False Positive.
RST.URL.FalsePositiveDescStringDescription why we think it may be a False Positive.
RST.URL.ParsedStringParsed URL components.
RST.URL.CVEStringRelated CVE (vulnerabilities)
RST.URL.IndustryStringRelated Industry.
RST.URL.ReportStringCollected from.

Command Example#

!url url="https://domain.local/testurl" threshold=30

Context Example#

{
"DBotScore": {
"Indicator": "https://domain.local/testurl",
"Score": 2,
"Type": "url",
"Vendor": "RST Cloud"
},
"RST": {
"URL": {
"CVE": [],
"Data": "https://domain.local/testurl",
"FalsePositive": "true",
"FalsePositiveDesc": "Resource unavailable",
"FirstSeen": "2021-01-05T00:00:00.000Z",
"LastSeen": "2021-01-26T00:00:00.000Z",
"Parsed": {
"anchor": null,
"domain": "domain.local",
"params": null,
"path": "/testurl",
"port": "443",
"schema": "https"
},
"RSTReference": "https://rstcloud.net/uuid?id=f64f7a99-068b-3fec-b572-598f9d11d4d6",
"Score": "14",
"Status": "503",
"Tags": [
"malware"
],
"Threat": [
"emotet"
],
"Type": "URL",
"UUID": "f64f7a99-068b-3fec-b572-598f9d11d4d6"
}
},
"URL": {
"Data": "https://domain.local/testurl",
"Tags": [
"malware"
]
}
}

Human Readable Output#

RST Threat Feed URL Reputation for: https://domain.local/testurl#

DescriptionLast SeenRelevanceScoreTagsThreat
Ioc with tags: malware. related threats: emotet
2021-01-26Suspicious14malwareemotet

file#


Returns File information and reputation.

Base Command#

file

Input#

Argument NameDescriptionRequired
fileList of Files.Required
thresholdIf the File has reputation above the threshold then the File defined as malicious. If threshold not set, then threshold from instance configuration is used. Default is 5.Optional

Context Output#

PathTypeDescription
DBotScore.IndicatorStringThe indicator that was tested.
DBotScore.ScoreNumberThe actual score.
DBotScore.TypeStringThe indicator type.
DBotScore.VendorStringThe vendor used to calculate the score.
File.NameStringThe file name.
File.MD5StringMD5 for the the file name.
File.SHA1StringSHA1 for the the file name.
File.SHA256StringThe URL.
File.TagsStringThe associated tags.
File.Malicious.VendorStringThe vendor reporting the File as malicious.
File.Malicious.DescriptionStringA description explaining why the File was reported as malicious.
File.Malicious.ScoreStringThe score calculated for the File indicator by the vendor.
RST.File.NameStringThe file name.
RST.File.MD5StringMD5 for the the file name.
RST.File.SHA1StringSHA1 for the the file name.
RST.File.SHA256StringSHA256 for the the file name.
RST.File.FirstSeenDateFirst Seen.
RST.File.LastSeenDateLast Seen.
RST.File.TagsStringThe associated tags.
RST.File.ThreatStringThe associated Malware Family or threat name.
RST.File.ScoreNumberThe total score.
RST.File.UUIDStringThe unique ID for the indicator.
RST.File.DescriptionStringThe associated Description provided by the vendor.
RST.File.FalsePositiveStringtrue if it is likely a False Positive.
RST.File.FalsePositiveDescStringDescription why we think it may be a False Positive.
RST.File.CVEStringRelated CVE (vulnerabilities)
RST.File.IndustryStringRelated Industry.
RST.File.ReportStringCollected from.

Command Example#

!file file="fe3d38316dc38a4ec63eac80e34cb157c9d896460f9b7b3bfbd2cec4e2cb8cdc"threshold=5

Context Example#

{
"DBotScore": {
"Indicator": "fe3d38316dc38a4ec63eac80e34cb157c9d896460f9b7b3bfbd2cec4e2cb8cdc",
"Score": 3,
"Type": "file",
"Vendor": "RST Cloud"
},
"RST": {
"File": {
"CVE": [],
"FalsePositive": "false",
"FalsePositiveDesc": "",
"FirstSeen": "2021-05-11T00:00:00.000Z",
"Industry": [],
"LastSeen": "2022-03-11T00:00:00.000Z",
"Name": [],
"RSTReference": "https://rstcloud.net/uuid?id=c86948e7-eb72-3fe1-96e9-429e885cea3b",
"Report": [
"https://www.threatfabric.com/blogs/partners-in-crime-medusa-cabassous.html"
],
"SHA256": "fe3d38316dc38a4ec63eac80e34cb157c9d896460f9b7b3bfbd2cec4e2cb8cdc",
"Score": "6",
"Tags": [
"malware"
],
"Threat": [
"medusa",
"flubot"
],
"Type": "File",
"UUID": "c86948e7-eb72-3fe1-96e9-429e885cea3b"
}
},
"File": {
"SHA256": "fe3d38316dc38a4ec63eac80e34cb157c9d896460f9b7b3bfbd2cec4e2cb8cdc",
"Tags": [
"malware"
]
}
}

Human Readable Output#

RST Threat Feed File Reputation for: https://domain.local/testurl#

DescriptionLast SeenRelevanceScoreTagsThreat
Ioc with tags: malware. related threats: emotet
2021-01-26Suspicious14malwareemotet

rst-submit-new#


Submits an indicator to RST Threat Feed.

Base Command#

rst-submit-new

Input#

Argument NameDescriptionRequired
iocList of IOCs (URLs, domains or IPs).Required
descriptionAny context to pass to RST Cloud.Optional

Context Output#

There is no context output for this command.

Command Example#

!rst-submit-new ioc="thisisamaliciouswebsite.com" description="a user downloaded a trojan"

Human Readable Output#

Indicator: thisisamaliciouswebsite.com was submitted as a potential threat indicator to RST Cloud

rst-submit-fp#


Submits a potential False Positive to RST Threat Feed.

Base Command#

rst-submit-fp

Input#

Argument NameDescriptionRequired
iocList of IOCs (URLs, domains or IPs).Required
descriptionAny context to pass to RST Cloud.Optional

Context Output#

There is no context output for this command.

Command Example#

!rst-submit-fp ioc="thisisnotamaliciousdomain.com" description="a decent website"

Human Readable Output#

Indicator: thisisnotamaliciousdomain.com was submitted as False Positive to RST Cloud